Unrated severityNVD Advisory· Published Dec 15, 2004· Updated Apr 16, 2026
CVE-2004-1145
CVE-2004-1145
Description
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
Affected products
61cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*+ 24 more
- cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*+ 10 more
- cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*+ 8 more
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/13586nvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200501-16.xmlnvdPatchVendor Advisory
- www.kb.cert.org/vuls/id/420222nvdPatchThird Party AdvisoryUS Government Resource
- www.kde.org/info/security/advisory-20041220-1.txtnvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2005-065.htmlnvdPatchVendor Advisory
- www.heise.de/security/dienste/browsercheck/tests/java.shtmlnvdVendor Advisory
- marc.infonvd
- www.mandriva.com/security/advisoriesnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/18596nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10173nvd
News mentions
0No linked articles in our index yet.